Search - IFIP Open Digital Library Access content directly

Filter your results

73 results
Structure: Internal structure identifier : 65509
Image document

Compositional Random Testing Using Extended Symbolic Transition Systems

Christian Schwarzl , Bernhard K. Aichernig , Franz Wotawa
23th International Conference on Testing Software and Systems (ICTSS), Nov 2011, Paris, France. pp.179-194, ⟨10.1007/978-3-642-24580-0_13⟩
Conference papers hal-01583918v1
Image document

Giving a Model-Based Testing Language a Formal Semantics via Partial MAX-SAT

Bernhard K. Aichernig , Christian Burghard
32th IFIP International Conference on Testing Software and Systems (ICTSS), Dec 2020, Naples, Italy. pp.35-51, ⟨10.1007/978-3-030-64881-7_3⟩
Conference papers hal-03239819v1
Image document

Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements

Alaa Alaqra , Simone Fischer-Hübner , Thomas Gross , Thomas Lorünser , Daniel Slamanig
David Aspinall; Jan Camenisch; Marit Hansen; Simone Fischer-Hübner; Charles Raab. Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers, AICT-476, Springer International Publishing, pp.79-96, 2016, IFIP Advances in Information and Communication Technology, 978-3-319-41762-2. ⟨10.1007/978-3-319-41763-9_6⟩
Book sections hal-01619744v1
Image document

Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves

Gerwin Gsenger , Christian Hanser
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.155-167
Conference papers hal-01506564v1
Image document

Side-Channel Leakage across Borders

Jörn-Marc Schmidt , Thomas Plos , Mario Kirschbaum , Michael Hutter , Marcel Medwed , et al.
9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.36-48, ⟨10.1007/978-3-642-12510-2_4⟩
Conference papers hal-01056100v1
Image document

Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms

Kurt Dietrich , Johannes Winter , Granit Luzhnica , Siegfried Podesser
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.45-58, ⟨10.1007/978-3-642-24712-5_4⟩
Conference papers hal-01596194v1
Image document

Fine-Grained Access Control in Industrial Internet of Things

Dominik Ziegler , Josef Sabongui , Gerald Palfinger
34th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Jun 2019, Lisbon, Portugal. pp.91-104, ⟨10.1007/978-3-030-22312-0_7⟩
Conference papers hal-03744312v1
Image document

Evaluating Experiences in Different Virtual Reality Setups

Volker Settgast , Johanna Pirker , Stefan Lontschar , Stefan Maggale , Christian Gütl
15th International Conference on Entertainment Computing (ICEC), Sep 2016, Wien, Austria. pp.115-125, ⟨10.1007/978-3-319-46100-7_10⟩
Conference papers hal-01640299v1
Image document

Checking Response-Time Properties of Web-Service Applications Under Stochastic User Profiles

Richard Schumi , Priska Lang , Bernhard K. Aichernig , Willibald Krenn , Rupert Schlick
29th IFIP International Conference on Testing Software and Systems (ICTSS), Oct 2017, St. Petersburg, Russia. pp.293-310, ⟨10.1007/978-3-319-67549-7_18⟩
Conference papers hal-01678972v1
Image document

Towards More Practical Time-Driven Cache Attacks

Raphael Spreitzer , Benoît Gérard
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.24-39, ⟨10.1007/978-3-662-43826-8_3⟩
Conference papers hal-01400918v1
Image document

The Shortest Path Game: Complexity and Algorithms

Andreas Darmann , Ulrich Pferschy , Joachim Schauer
8th IFIP International Conference on Theoretical Computer Science (TCS), Sep 2014, Rome, Italy. pp.39-53, ⟨10.1007/978-3-662-44602-7_4⟩
Conference papers hal-01402026v1
Image document

Mobile Device Encryption Systems

Peter Teufl , Thomas Zefferer , Christof Stromberger
28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.203-216, ⟨10.1007/978-3-642-39218-4_16⟩
Conference papers hal-01463828v1
Image document

Implementation and Evaluation of an SCA-Resistant Embedded Processor

Stefan Tillich , Mario Kirschbaum , Alexander Szekely
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.151-165, ⟨10.1007/978-3-642-27257-8_10⟩
Conference papers hal-01596304v1